Digital Image Forgeries and Passive Image Authentication Techniques: A Survey
暂无分享,去创建一个
[1] Zhang Xiong,et al. 3D lighting-based image forgery detection using shape-from-shading , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).
[2] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[3] K. J. Ray Liu,et al. Forensic detection of image manipulation using statistical intrinsic fingerprints , 2010, IEEE Transactions on Information Forensics and Security.
[4] Xiaochun Cao,et al. Detecting and Extracting the Photo Composites Using Planar Homography and Graph Cut , 2010, IEEE Transactions on Information Forensics and Security.
[5] Mohd Aizaini Maarof,et al. Sequential Straightforward Clustering for Local Image Block Matching , 2011 .
[6] H. Farid. A Survey of Image Forgery Detection , 2008 .
[7] Muhammad Ghulam,et al. Passive copy move image forgery detection using undecimated dyadic wavelet transform , 2012, Digit. Investig..
[8] Edoardo Ardizzone,et al. Copy-move forgery detection via texture description , 2010, MiFor '10.
[9] Jiwu Huang,et al. A survey of passive technology for digital image forensics , 2007, Frontiers of Computer Science in China.
[10] Jiwu Huang,et al. Detect Digital Image Splicing with Visual Cues , 2009, Information Hiding.
[11] Xuemin Wu,et al. Image Splicing Detection Using Illuminant Color Inconsistency , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[12] Hany Farid,et al. Detecting Digital Forgeries Using Bispectral Analysis , 1999 .
[13] N. Ohnishi,et al. Exploring duplicated regions in natural images. , 2010, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.
[14] Yogesh Rathore,et al. DWT Based Copy-Move Image Forgery Detection , 2012 .
[15] Xinpeng Zhang,et al. Image Splicing Detection Using Camera Characteristic Inconsistency , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[16] Wei Lu,et al. Digital image forensics using statistical features and neural network classifier , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[17] Thomas S. Huang,et al. Image processing , 1971 .
[18] Michele De Santis,et al. Holographic watermarking for authentication of cut images , 2011 .
[19] Héctor M. Pérez Meana,et al. Watermarking-based image authentication with recovery capability using halftoning technique , 2013, Signal Process. Image Commun..
[20] Siyuan Fang,et al. Multi-perspective Panoramas of Long Scenes , 2012, 2012 IEEE International Conference on Multimedia and Expo.
[21] Shih-Fu Chang,et al. Blind detection of photomontage using higher order statistics , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[22] David Renshaw,et al. IEEE International Symposium on Circuits and Systems (ISCAS) , 1990 .
[23] Mohd Aizaini Maarof,et al. Efficient image duplicated region detection model using sequential block clustering , 2013, Digit. Investig..
[24] Jing Dong,et al. Effective image splicing detection based on image chroma , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[25] Shih-Fu Chang,et al. Passive-blind Image Forensics , 2006 .
[26] Jianhua Li,et al. Detecting Digital Image Splicing in Chroma Spaces , 2010, IWDW.
[27] Wei Sun,et al. Improved DCT-based detection of copy-move forgery in images. , 2011, Forensic science international.
[28] Wenjun Zeng,et al. Multimedia Security Technologies for Digital Rights Management , 2006 .
[29] Tom E. Bishop,et al. Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[30] Yao Zhao,et al. Contrast Enhancement-Based Forensics in Digital Images , 2014, IEEE Transactions on Information Forensics and Security.
[31] Asoke K. Nandi,et al. Automated detection and localisation of duplicated regions affected by reflection, rotation and scaling in image forensics , 2011, Signal Process..
[32] Shiguo Lian,et al. A passive image authentication scheme for detecting region-duplication forgery with rotation , 2011, J. Netw. Comput. Appl..
[33] Guna Seetharaman,et al. Harnessing Motion Blur to Unveil Splicing , 2014, IEEE Transactions on Information Forensics and Security.
[34] Luisa Verdoliva,et al. A Bayesian-MRF Approach for PRNU-Based Image Forgery Detection , 2014, IEEE Transactions on Information Forensics and Security.
[35] Mahalingam Ramkumar,et al. A classifier design for detecting image manipulations , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[36] Mengjia Xu,et al. Image region duplication detection based on circular window expansion and phase correlation. , 2012, Forensic science international.
[37] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[38] Hongtao Lu,et al. Digital image splicing detection based on approximate run length , 2011, Pattern Recognit. Lett..
[39] Xiaochun Cao,et al. Identifying Image Composites Through Shadow Matte Consistency , 2011, IEEE Transactions on Information Forensics and Security.
[40] Zhen Zhang,et al. An Effective Algorithm of Image Splicing Detection , 2008, 2008 International Conference on Computer Science and Software Engineering.
[41] C.G. Patil,et al. Detection of Region Duplication Forgery in Digital Images Using Wavelets and Log-Polar Mapping , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[42] B. L. Shivakumar,et al. Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Current Methods , 2010 .
[43] Hany Farid,et al. Exposing Digital Forgeries Through Specular Highlights on the Eye , 2007, Information Hiding.
[44] Der-Chyuan Lou,et al. A semi-blind digital watermarking scheme based on singular value decomposition , 2006, Comput. Stand. Interfaces.
[45] Tao Jing,et al. Image splicing detection based on moment features and Hilbert-Huang Transform , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[46] Yingda Lv,et al. An improved image blind identification based on inconsistency in light source direction , 2011, The Journal of Supercomputing.
[47] Shaziya .P.S. Khan,et al. Exposing Digital Image Forgeries by Illumination Color Classification , 2015 .
[48] Shih-Fu Chang,et al. A model for image splicing , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[49] Hany Farid,et al. Exposing digital forgeries from 3-D lighting environments , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[50] Jan P. Allebach,et al. Forensic techniques for classifying scanner, computer generated and digital camera images , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[51] Wei Lu,et al. Digital image splicing detection based on Markov features in DCT and DWT domain , 2012, Pattern Recognit..
[52] K. J. Ray Liu,et al. Blind forensics of contrast enhancement in digital images , 2008, 2008 15th IEEE International Conference on Image Processing.
[53] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[54] Hong-Yuan Mark Liao,et al. An efficient expanding block algorithm for image copy-move forgery detection , 2013, Inf. Sci..
[55] Cheng Yang,et al. Image authentication based on digital signature and semi-fragile watermarking , 2008, Journal of Computer Science and Technology.
[56] Jianru Xue,et al. Image forensic signature for content authenticity analysis , 2012, J. Vis. Commun. Image Represent..
[57] XiaoBing Kang,et al. Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics , 2008, 2008 International Conference on Computer Science and Software Engineering.
[58] E. S. Gopi Subbu,et al. Digital Image Forgery Detection using Artificial Neural Network and Auto Regressive Coefficients , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[59] Zhi-ping Zhou,et al. Image splicing detection based on image quality and analysis of variance , 2010, 2010 2nd International Conference on Education Technology and Computer.
[60] Farrokh Janabi-Sharifi,et al. Data-driven modeling of thermal energy storage tank , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).
[61] Ibon Saratxaga,et al. Detection of synthetic speech for the problem of imposture , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[62] Yingda Lv,et al. Blind Identification Method for Authenticity of Infinite Light Source Images , 2010, 2010 Fifth International Conference on Frontier of Computer Science and Technology.
[63] Madhumita Sengupta,et al. Authentication Through Hough Transformation Generated Signature on G-Let D3 Domain (AHSG)☆ , 2013 .
[64] Kouichi Sakurai,et al. Exploiting reference images for image splicing verification , 2013, Digit. Investig..
[65] Alberto Del Bimbo,et al. Copy-move forgery detection and localization by means of robust clustering with J-Linkage , 2013, Signal Process. Image Commun..
[66] Zhen Zhang,et al. A survey on passive-blind image forgery by doctor method detection , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[67] Shih-Fu Chang,et al. Generating Robust Digital Signature for Image/Video Authentication , 1998 .
[68] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[69] Tian-Tsong Ng,et al. Camera response function signature for digital forensics - Part I: Theory and data selection , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[70] Ahmad Faraahi,et al. DWT-DCT (QCD) based copy-move image forgery detection , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.
[71] Pravin Kakar,et al. Exposing Postprocessed Copy–Paste Forgeries Through Transform-Invariant Features , 2012, IEEE Transactions on Information Forensics and Security.
[72] Wei Su,et al. Rake transform and edge statistics for image forgery detection , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[73] Xinpeng Zhang,et al. Image Splicing Detection Using Color Edge Inconsistency , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[74] Yao Zhao,et al. Forensic estimation of gamma correction in digital images , 2010, 2010 IEEE International Conference on Image Processing.
[75] Pan Feng,et al. A survey of passive technology for digital image forensics , 2007 .
[76] Hany Farid,et al. Exposing digital forgeries by detecting inconsistencies in lighting , 2005, MM&Sec '05.
[77] Jichang Guo,et al. Passive forensics for copy-move image forgery using a method based on DCT and SVD. , 2013, Forensic science international.
[78] Wei Su,et al. Image splicing detection using 2-D phase congruency and statistical moments of characteristic function , 2007, Electronic Imaging.
[79] Minglun Gong,et al. An Efficient Match-based Duplication Detection Algorithm , 2006, The 3rd Canadian Conference on Computer and Robot Vision (CRV'06).
[80] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[81] Chen Haipeng. Blind identification algorithm for retouched images based on Bi-Laplacian , 2011 .
[82] Shih-Fu Chang. Blind Passive Media Forensics: Motivation and Opportunity , 2007, MCAM.
[83] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[84] Asifullah Khan,et al. Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..
[85] G. Bebis,et al. Blind copy move image forgery detection using dyadic undecimated wavelet transform , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).
[86] K. J. Ray Liu,et al. Forensic estimation and reconstruction of a contrast enhancement mapping , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[87] B. Mahdian,et al. Blind methods for detecting image fakery , 2008, 2008 42nd Annual IEEE International Carnahan Conference on Security Technology.
[88] David R. Bull,et al. Projective image restoration using sparsity regularization , 2013, 2013 IEEE International Conference on Image Processing.
[89] Wei Su,et al. Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition , 2006, IWDW.
[90] Hwei-Jen Lin,et al. An Efficient Method for Copy-Move Forgery Detection , 2009 .
[91] Ran-Zan Wang,et al. Reversible Authentication and Cross-Recovery of Images Using (t, n) Threshold and Modified-RCM Watermarking , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[92] Judith Redi,et al. Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.
[93] Xuan-jing Shen,et al. Blind identification algorithm for retouched images based on Bi-Laplacian: Blind identification algorithm for retouched images based on Bi-Laplacian , 2011 .
[94] Qingzhong Liu,et al. A new approach for JPEG resize and image splicing detection , 2009, MiFor '09.
[95] Tian-Tsong Ng,et al. Camera response function signature for digital forensics - Part II: Signature extraction , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[96] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.